Console Password Manager (CPM) Designed for System Administrators, to handle user logins for several computers running Linux. It works with a console interface, based on the CDK library that uses ncurses. Import data from csv files and export to text files with a free definable format.

Linux Audit and Intrusion Detection InterSect Alliance are the creators of the SNARE Linux C2-style Audit module, and have a consulting background in advanced audit analysis, intrusion detection systems, and forensics for Unix and other operating systems.

LinuxSecure This site on Linux and security covers firewalls (iptables), intrusion detection systems (snort), securing services, and Linux security in general. The aim is to provide information about protection, detection, and reaction with respect to attacks.

Penetrator Megablaster A kernel module that detects and stops overflow attacks, like Linux Buffer Overflow attack security, which aim to get an interactive access to the system.

Security-Enhanced Linux (SELinux) National Security Agency research project, to modify the Linux kernel with enhanced security-related functions, including mandatory access controls. Now included in modern Linux kernels.

SSH, the Secure Shell: The Definitive Guide This is a companion website for "SSH: The Secure Shell The Definitive Guide" by Daniel Barrett and Richard Silverman (O'Reilly, 2003). It contains technical details on the SSH as well as sample book material.